shutterstock 99713225 TEST SIZE V8 051016


 "Only the Client can define Quality."

Have IT Questions?
Call us now (888) 894-6411


TWINTEL Solutions has been serving the Orange County, Los Angeles County, Riverside County, and San Diego County, areas. Since 2005, TWINTEL has provided IT Support such as technical help desk support, computer support, and overall IT consulting to small and medium-sized businesses.

Can Chargers Be Interchanged Between Devices?

Can Chargers Be Interchanged Between Devices?

One of the major benefits of a laptop is the mobility that it permits--but this is a double-edged sword, as this mobility means that you are relying on the device’s battery life. Of course, if your laptop begins to die, you can always borrow someone else’s charger, right?

Actually, this is a very bad idea, as it puts your device at serious risk. There are a few reasons why this is the case.

Manufacturer Differences
When whichever company produced your laptop did so, it did so in a very specific way. This includes the charger that comes with the laptop. Trying a different manufacturer’s charger with your laptop will almost certainly damage your battery. Best case scenario, your laptop’s battery will reject the charger. You should only ever use a charger that was produced by the device’s manufacturer, even if another charger appears to supply the same amount of power.

On the subject of power…

Different Power Requirements
Like we mentioned before, your laptop’s original charger was specifically manufactured to your laptop’s specifications. As a result, the charger is made to supply exactly how much power your device needs. A charger from a different manufacturer might supply too much or too little power, potentially damaging the battery or the laptop’s other hardware.

Why You Should Avoid Cheap Off-Brand Chargers
If it’s bad to utilize another established brand’s charger, it’s worse to subject your laptop to a knock-off, no-name charger. There is no guarantee that the charger is of a trustworthy quality, as well as no way to tell if its alleged power output is actually what it sends into your device. If you do need to replace your charger, or you just want a spare, invest in the real McCoy. Otherwise, your short-term costs savings may translate into the cost of a new device.

Have you ever found yourself without a charger and tempted to borrow someone else’s? What happened if and when your battery died? Share your experience with us in the comments!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 22 May 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!


Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Privacy Cloud Best Practices Technology Business Computing Backup Hackers Network Security Malware Hosted Solutions Microsoft Software bgc Google roundup nonprofit VoIP Email Alert Disaster Recovery Managed IT Services Business Continuity Mobile Devices Business Data Internet Outsourced IT Windows 10 Ransomware Smartphones communications Browser IT Services Cybercrime Innovation Saving Money Hardware Android Computers Managed IT Services Efficiency Small Business IT Support Server Cloud Computing Data Backup Smartphone Business Management Productivity Computer Office User Tips Mobile Device Management Quick Tips Social Engineering Telephone Systems BDR Recovery Cybersecurity Managed IT Internet of Things BYOD Windows Passwords Data Recovery Communication Hacking Money Collaboration Network Productivity Virtualization Law Enforcement Save Money Phishing Mobility Work/Life Balance Vulnerability Budget IT Support Private Cloud Bandwidth Office Tips Holiday Automation App Two-factor Authentication Managed Service Provider Wi-Fi Tech Term VPN How To Proactive IT Firewall Miscellaneous Bring Your Own Device Upgrade Chrome Artificial Intelligence Flexibility Avoiding Downtime Remote Monitoring Health Data Protection Social Media Value Applications Data Security Information Technology Facebook Gadgets History Mobile Device Windows 10 Safety Password Redundancy Microsoft Office Google Drive Remote Computing HaaS Compliance Identity Theft Business Intelligence Black Market Operating System Apps Data Breach Office 365 Workplace Tips PDF Solid State Drive The Internet of Things Legal Worker Comparison Update SaaS Router Workers Physical Security Mobile Computing Big Data Wireless Technology Spam OneNote Data storage Business Owner Data Storage Charger Risk Management Electronic Medical Records Government IT Management Computing Infrastructure Marketing Save Time Employer-Employee Relationship IT Plan Spam Blocking Keyboard CES Content Filtering Hiring/Firing Automobile Cleaning Credit Cards Emergency Word Data Management Computer Care End of Support Battery Patch Management Unsupported Software Samsung HIPAA Scam Infrastructure Software Tips Audit Staff Transportation Robot Relocation Amazon Web Services Current Events Customers Files Audiobook Password Manager Software as a Service Computer Fan Instant Messaging Loyalty USB Digital Signature Laptop Benefits Humor Online Shopping Servers Nanotechnology Users Knowledge Content Best Practice Rootkit Entertainment Business Mangement Specifications Sports HBO FENG Search Troubleshooting Encryption Touchpad Smart Technology Evernote NarrowBand Flash Smart Tech Virtual Reality Network Congestion Screen Mirroring Training Gmail WiFi Millennials Outlook How to Accountants Two Factor Authentication Wireless Charging Sync Connectivity Worker Commute Cast Video Games Vendor Management User Error Recycling Google Docs Workforce Assessment Wireless Books Fiber-Optic Telephony Devices IT Consultant Settings Colocation eWaste Website Telecommuting Frequently Asked Questions CrashOverride Television Hosted Solution Practices Techology Monitor Cables Skype Thought Leadership Document Management Leadership Politics Criminal Voice over Internet Protocol Remote Work Excel Meetings Shadow IT Public Computer Hosted Computing Unified Communications Chromecast Start Menu Twitter Unified Threat Management Hacker Multi-Factor Security Tip of the week Data loss Inventory Apple Theft Tools Addiction Windows 10s Internet Exlporer Experience Content Management Trending Windows Server 2008 Access Control Employer Employee Relationship iPhone Cortana webinar Data Warehousing Public Cloud Blockchain Going Green Lifestyle Authentication Fraud YouTube Windows 7 IBM Conferencing Computer Accessories Google Apps Mobile Scalability Advertising Human Resources Downtime Amazon Regulations Education Supercomputer Hard Drives Netflix Bluetooth Reputation Professional Services Congratulations nonprofits Cache Wireless Internet Thank You